Blog

The SPHINX system generates alerts and notifications based on a large amount of data, which the Interactive Dashboard (ID) component explores, visualizes, and analyses, to identify trends and better understand the cybersecurity aspects of the network infrastructure. Then these data visualisations are grouped in dashboards. The...

Logging mechanisms on web applications daily collect a huge amount of data that, when used effectively, they can provide important insights for cybersecurity. Identifying attacks and responding to them appears as a challenge to cybersecurity researchers, who need to adopt user and data provenance centric...

Date: Monday, February 1st, 2021 Location: Online Zoom Call ViLabs organized and coordinated an interactive SPHINX exploitation workshop, as a joint effort to elaborate on actions for maximizing the exploitation, sustainability, and business potential of the project’s key exploitable outcomes. Within the framework of the foreseen exploitation activities...

The term ‘Decision Support System’ refers to an interactive computer-based system or subsystem intended to help decision-makers use communications technologies, data, documents, knowledge and/or models to identify and solve problems, complete decision process tasks, and make decisions. There are five main categories of DSSs: Communications-driven Data-driven ...

The SPHINX Service Manager (SM) component keeps the registry of services managing information such as the service name, description,  URL,  version,  call  method,  exceptions, security, and  permissions  based  on  role management. Different roles are supported by this component. For example,  a role name “admin” is featured...

The Knowledge Base Repository (KBR) is an important part of SPHINX Toolkit. Its purpose is to combine information regarding attacks and vulnerabilities and to incorporate it into a large repository associated with possible solutions and links to other vulnerabilities. The component is implemented with user friendliness...

Honeypots are computer security components used to deflect cyber-attacks and deter certain types of attacks. They try to perfectly emulate information system resources with data that seem legitimate in order to lure the attackers in them and protect the real systems of a network from...

SPHINX Consortium member DYPE5, the fifth Greek Regional Health Authority, hosted a workshop that was dedicated to IT personnel of Healthcare organisations in order to raise their awareness regarding contemporary cybersecurity matters. The workshop took place virtually in Wednesday, 16 December 2020 and partners from National Technical...

On Thursday, 10 December, the EU funded observatory of research and innovation in the field of cybersecurity and privacy, Cyberwatching.eu hosted the webinar Security and Privacy by Design for Healthcare. The context of the event was based on the present global situation that the Covid19 pandemic has brought to the...

SPHINX’s support to incident forensics is materialised in the Forensic Data Collection Engine (FDCE) component which correlates, analyses and stores in a privacy-respectful manner all incident-related information and data from different levels and contexts of the system. The FDCE is able to discover the relationships between...